Agustin Gianni

@agustingianni

I am goose. Not updating my blog since AD 2014. 🇸🇲

Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @agustingianni

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @agustingianni

  1. proslijedio/la je Tweet
    15. sij

    Assert yourself on the browser playground with ’s guide to hunting Chrome IPC sandbox escapes:

    Poništi
  2. proslijedio/la je Tweet
    17. pro 2019.

    Part 2 of the "whoopsie-daisy" series. This one is about exploiting a TOCTOU. It includes some info about user ids (RUID/EUID/SUID), signals (SIGSEGV/SIGTRAP), advisory file locks, and inotify.

    Poništi
  3. proslijedio/la je Tweet
    12. pro 2019.

    First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned.

    Poništi
  4. proslijedio/la je Tweet
    9. pro 2019.
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    9. pro 2019.

    Hey there, I'm currently looking for a new Senior or role! Preferably in Edinburgh, or UK Remote. If you're currently looking for new people, or know someone looking I'd love to hear from you :) Some details in this thread👇

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    9. pro 2019.

    Come work with and I on making the world's code more efficient!

    Poništi
  7. 4. pro 2019.

    Only two remote holes in the default install, in a heck of a long time!

    Poništi
  8. proslijedio/la je Tweet
    3. pro 2019.

    Today marks the release of the debugging and tracing library I have intermittently worked on over the years. The name is a tribute to the interface that has so generously provided us with local privilege escalation for several decades. May it be of use.

    Poništi
  9. 3. lip 2019.

    No reason to pay 1000 USD for a monitor stand when you can buy "The Art of Software Security Assessment" for 70 bucks.

    Poništi
  10. proslijedio/la je Tweet
    27. svi 2019.
    Poništi
  11. proslijedio/la je Tweet
    18. tra 2019.

    Slide deck (PDF) from my talk "Vs .sandbox" on reverse engineering the Apple iOS sandbox kernel extension:

    Poništi
  12. 1. ožu 2019.
    Poništi
  13. 14. velj 2019.

    Just arrived to any friends here already?

    Poništi
  14. proslijedio/la je Tweet
    17. sij 2019.
    Odgovor korisniku/ci

    Hey I have this problem where I try to do Ctrl+Z and nothing happens.

    Poništi
  15. proslijedio/la je Tweet
    14. sij 2019.

    Finally! I'm releasing my tool,"Virtuailor", it reconstructs C++ vtables in IDA and helps making C++ RE easier! Enjoy! 😀

    Poništi
  16. proslijedio/la je Tweet
    8. pro 2018.
    Poništi
  17. proslijedio/la je Tweet
    17. ruj 2018.

    Ok, so A12 kernel pointers are messed up. If a ptr's highest bit is zero, everything in this post applies: If the highest bit is one, then: actualValue = ((value & 0x0000ffff00000000) << 8) | ((kernelBase + (value & 0xffffffff)) & 0xffffffffffff);

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    11. ruj 2018.

    Security education is something we are deeply passionate about, and we're trying to help make it better. Read about the accessible, gamified approach we've been using to teach and scale binary exploitation education:

    Poništi
  19. proslijedio/la je Tweet
    22. kol 2018.

    Here you have the contract. It's smart. It can change. Sign here.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·